General

  • Target

    ASA_Cheats v9.9.8.exe

  • Size

    9.8MB

  • Sample

    250219-weyz4axnv5

  • MD5

    eb4a83f674cbbc9dff30ce9c96194c3e

  • SHA1

    579de894b65fbbd1953ed72f9c068bbd8e86f10f

  • SHA256

    ae991565c4df9763e5a451a8b9392d9519c638a9dba90a41f30393b7b400296c

  • SHA512

    de03bfd977f7649244c7a03fd92a8214ee718a9e40caa65e12be908bc0b3046585f33f955d9a10e4220f0945b327ff3dd507ccb9e21620047af675d24a07e35f

  • SSDEEP

    196608:vBOBTJawpAFnjE74PEuPscgzAAsB+dJSOO/sgEztL5BruyMKSjOpzkKJrsIaYV5S:5OBTJaEAy74PVPsczMdJSJs5VpSCpzkF

Malware Config

Extracted

Family

orcus

Botnet

FabiOlux

C2

31.44.184.52:58820

Mutex

sudo_n1bepybhxyjzq12itezrjd96eddvpyn0

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\AntimalwareServiceExecutable\AntimalwareServiceExecutable.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Targets

    • Target

      ASA_Cheats v9.9.8.exe

    • Size

      9.8MB

    • MD5

      eb4a83f674cbbc9dff30ce9c96194c3e

    • SHA1

      579de894b65fbbd1953ed72f9c068bbd8e86f10f

    • SHA256

      ae991565c4df9763e5a451a8b9392d9519c638a9dba90a41f30393b7b400296c

    • SHA512

      de03bfd977f7649244c7a03fd92a8214ee718a9e40caa65e12be908bc0b3046585f33f955d9a10e4220f0945b327ff3dd507ccb9e21620047af675d24a07e35f

    • SSDEEP

      196608:vBOBTJawpAFnjE74PEuPscgzAAsB+dJSOO/sgEztL5BruyMKSjOpzkKJrsIaYV5S:5OBTJaEAy74PVPsczMdJSJs5VpSCpzkF

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus family

    • Orcurs Rat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks